Movatterモバイル変換


[0]ホーム

URL:


US11777799B2 - Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s) - Google Patents

Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)
Download PDF

Info

Publication number
US11777799B2
US11777799B2US17/395,167US202117395167AUS11777799B2US 11777799 B2US11777799 B2US 11777799B2US 202117395167 AUS202117395167 AUS 202117395167AUS 11777799 B2US11777799 B2US 11777799B2
Authority
US
United States
Prior art keywords
contextual
network
data
enterprise
enterprise network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US17/395,167
Other versions
US20220200928A1 (en
Inventor
Daniel Robert Garrison
Brian Sarbin
Ali Ebtekar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology IncfiledCriticalCisco Technology Inc
Priority to US17/395,167priorityCriticalpatent/US11777799B2/en
Assigned to CISCO TECHNOLOGY, INC.reassignmentCISCO TECHNOLOGY, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: EBTEKAR, ALI, GARRISON, DANIEL ROBERT, SARBIN, BRIAN
Publication of US20220200928A1publicationCriticalpatent/US20220200928A1/en
Priority to US18/354,011prioritypatent/US12301416B2/en
Application grantedgrantedCritical
Publication of US11777799B2publicationCriticalpatent/US11777799B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods are provided in which a computing device obtains, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network. The inventory data includes configuration information of the enterprise network. The method further includes the computing device selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks and generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.

Description

CROSS-REFERENCE TO RELATED APPLICATION
This application claims the benefit of priority under 35 U.S.C. § 119(e) to U.S. Provisional Patent Application No. 63/128,463, entitled “CUSTOMER SERVICE CLOUD PORTAL SYSTEM,” filed on Dec. 21, 2020, which is hereby incorporated by reference in its entirety.
TECHNICAL FIELD
The present disclosure relates to computer networks and systems.
BACKGROUND
Enterprise service functions for equipment and software can be burdensome and inefficient. This is particularly the case for enterprises that have large networks or systems of numerous instances and types of equipment and software. Tracking performance and troubleshooting issues with networking or other types of equipment and software in large networks is time consuming.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG.1 is a block diagram of a system that includes an enterprise service cloud portal that interacts with network/computing equipment and software residing at various enterprise sites, according to an example embodiment.
FIG.2 is a high-level architecture diagram for generating contextual guides for managing equipment and software in an enterprise, according to an example embodiment.
FIG.3 is a detailed system architecture diagram for managing enterprise resources, according to an example embodiment.
FIG.4 is a screen shot illustrating a high-level view of contextualization of network resources of an enterprise, according to an example embodiment.
FIG.5 is a flow diagram of a method for changing a configuration of at least one affected network resource in an enterprise based on one or more contextual advisories, according to an example embodiment.
FIG.6 is a screen shot illustrating an advisories view of the contextualization of the network resources of the enterprise, according to an example embodiment.
FIG.7 is a screen shot illustrating affected assets of a security advisory, according to an example embodiment.
FIG.8 is a screen shot illustrating potentially affected assets of a security advisory, according to an example embodiment.
FIG.9 is a flow diagram of a method for changing a configuration of at least one affected network resource in an enterprise based on one or more support guides, according to an example embodiment.
FIG.10 is a screen shot illustrating a cases view of the contextualization of the network resources of the enterprise, according to an example embodiment.
FIG.11 is a screen shot illustrating an individual asset level view of contextualization, according to an example embodiment.
FIG.12 is a flowchart illustrating a method of generating one or more contextual guides specific to one or more affected network resources of an enterprise, according to an example embodiment.
FIG.13 is a hardware block diagram of a computing device that may perform functions associated with any combination of operations in connection with the techniques depicted and described inFIGS.1-12.
DESCRIPTION OF EXAMPLE EMBODIMENTS
Overview
Briefly, methods are presented for aggregating disparate cross-domain data related to enterprise network/computing system behavior, equipment telemetry, enterprise data, and a knowledge base into contextual guides that include advisories and supporting material specific to various aspects of an enterprise network.
In one example, a method is provided that includes obtaining, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network. The inventory data includes configuration information of the enterprise network. The method further involves selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks. The method then includes generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
Example Embodiments
FIG.1 is a block diagram of a system10 that includes an enterprise service cloud portal (cloud portal)100 that interacts with network/computing equipment and software102(1)-102(N) residing at various enterprise sites110(1)-110(N), or in cloud deployments of an enterprise, according to an example embodiment.
The network/computing equipment and software102(1)-102(N) are resources or assets of an enterprise (the terms “assets” and “resources” are used interchangeably herein). The network/computing equipment and software102(1)-102(N) may include any type of network devices or network nodes such as controllers, access points, gateways, switches, routers, hubs, bridges, gateways, modems, firewalls, intrusion protection devices/software, repeaters, servers, and so on. The network/computing equipment and software102(1)-102(N) may further include endpoint or user devices such as a personal computer, laptop, tablet, and so on. The network/computing equipment and software102(1)-102(N) may include virtual nodes such as virtual machines, containers, point of delivery (PoD), and software such as system software (operating systems), firmware, security software such as firewalls, and other software products. Associated with the network/computing equipment and software102(1)-102(N) is configuration and feature related information (configuration data) representing various configurations, such as enabled and disabled features. The network/computing equipment and software102(1)-102(N), located at the enterprise sites110(1)-110(N), represent information technology (IT) environment of an enterprise.
The enterprise sites110(1)-110(N) may be physical locations such as one or more data centers, facilities, or buildings located across geographic areas that designated to host the network/computing equipment and software102(1)-102(N). The enterprise sites110(1)-110(N) may further include one or more virtual data centers, which are a pool or a collection of cloud-based infrastructure resources specifically designed for enterprise needs, and/or for cloud-based service provider needs.
The network/computing equipment and software102(1)-102(N) may send to thecloud portal100, via telemetry techniques, data about their operational status and configurations so that thecloud portal100 is continuously updated about the operational status, configurations, software versions, etc. of each instance of the network/computing equipment and software102(1)-102(N) of an enterprise.
Thecloud portal100 is driven by human and digital intelligence that serves as a one-stop destination for equipment and software of an enterprise to access insights and expertise when needed. Examples of capabilities include assets and coverage, advisories, cases (errors or issues to troubleshoot), automation workbench, insights, and so on. Thecloud portal100 threads data from multiple disparate sources into a contextualized digital representation of the enterprise's IT environment via a portfolio of hardware/software assets and services from one or more providers.
Thecloud portal100 may be executed by one or more computing devices, such as servers.
FIG.2 is a high-level diagram illustrating anarchitecture200 for generating contextual guides via data threading, according to an example embodiment. Reference is also made toFIG.1 for purposes of the description ofFIG.2. Thearchitecture200 includes various entities includingasset inventory systems210 that produce a unified end-to-end inventory (inventory)220, and data andinformation systems230 that are used to generatecontextual insights250. The unified end-to-end inventory220 andcontextual insights250 are used to generatecontextual guides260 that are provided to a network operator or auser270.
Theasset inventory systems210 include various sources ofinventory220 of an enterprise. That is, a suite of data sources is integrated to present a unified view of the enterprise's assets or resources across numerous dimensions, domains, or enterprise sites110(1)-110(N). Theinventory220 is a result of the threading and correlation of data across multiple disparate sources.
The sources include purchase andcommerce systems212, product andnetwork telemetry214, a configuration management database (CMDB)216, andoffline spreadsheets218. The purchase andcommerce systems212 include purchase and contract data obtained from various commerce tools and subscription systems. The purchase and contract data may include contract details such as asset purchase date, warranty status and expiry, support coverage status and expiry. The product andnetwork telemetry214 may include telemetry data from cloud agents/collectors and underlying product telemetry for asset connectivity status, management controller, software type, software release, and configured features. The CMDB216 may include configuration information for various enterprise assets. Theoffline spreadsheets218 may include information about the assets such as models, location, and so on. These are just some examples of the various sources in theasset inventory systems210. The types and number of sources depend on a particular deployment of an enterprise network.
The data andinformation systems230 are knowledge databases that include various supporting materials that may be used to interpret theinventory220. The data andinformation systems230 may include advisory databases232 (advisory information systems),telemetry data234, electronic learning (e-learning) libraries236 (online libraries), product guidance and documentation238 (product or service guides and documentation), supportcase managements platforms240,community forums242,contract data244, andcontent management systems246.
Theadvisory databases232 or the advisory information systems may be published by various service providers. The advisory databases232 (the advisory information systems) may include security advisories, field notices, known bugs, published end of life milestones (e.g. end of sale, end of support) affecting one or more resource, and other notices or contextual alerts.
Thetelemetry data234, obtained by a provider from various enterprises, includes software types, releases, typically enabled and disabled features and so on.
The e-learning libraries236 (online libraries) include content provided by a hosted provider and/or a third party. The content may be free and premium (paid) content relating to one or more resources including live and on-demand videos, e-courses, learning labs, and so on.
The product guides and documentation238 (product or service guides and documentation) includes configuration guides for the resources, deployment guides, user manuals, and other product documentation.
The supportcase management platforms240 include support cases opened against one or more resources and an ability to contextually trigger generating a new support case via an asset/resource entitlement. The support cases are for various enterprises and indicate issues or difficulties that may be encountered with a particular asset (compatibility, feature configuration, and so on).
Thecommunity forums242 include popular and useful community forum posts relating to one or more resources such as hardware product type or software type/release.
Thecontract data244 provides information about warranty coverages and/or support available for various hardware or software.
Thecontent management systems246 includes both free and premium (paid) support and training content relating to one or more resources such as ask an expert webinars, accelerator one-on-one coaching sessions, customized group training sessions and so on.
Thecontextual insights250 are generated using supporting material from the data andinformation systems230. Thecontextual insights250 are analytics data that improves understanding of one or more aspects or issues in an enterprise network and include supporting materials and advisories with respect to theinventory220. By way of an example, thecontextual insights250 may identify a network problem or a troubleshooting issue, one or more reasons for the network problem, and possible remediation actions.
Thearchitecture200 includes, at280, thecloud portal100 analyzing data in theasset inventory systems210 to generate theinventory220 of the enterprise. Specifically, thecloud portal100 analyzes the telemetry data, the configuration data, and the service related information from a subscription system to generate theinventory220. Theinventory220 includes information about the network/computing equipment and software102(1)-102(N) at the enterprise sites110(1)-110(N). Theinventory220 includes data related to identification, location, configurations, descriptions, and so on for each resource or asset of the enterprise. Theinventory220 is resource information aggregated from the enterprise sites110(1)-110(N) that represent the IT environment of the enterprise, including hardware, software, and services provided by various service providers.
At282, thecloud portal100 extracts relevant support material (e.g., product support information) or content (contextual alerts) from the data andinformation systems230. The relevant support material applies to the one or more resources in theinventory220 to form thecontextual insights250.
At284, thecloud portal100 generatescontextual guides260 based on theinventory220 and thecontextual insights250. For example,contextual guides260 may include an identification of one or more affected resources (a particular piece of network equipment from among the one or more network/computing equipment and software102(1)-102(N)), identification of a respective one or more domains from the enterprise sites110(1)-110(N), where the affected resource is located, and the applicable contextual insight. An example of a contextual insight may be that the affected resource needs to be upgraded to a newly released version of an operating system.
At286, thecontextual guides260 are then output, via a display, to theuser270. In one example embodiment, thecontextual guides260 are used to reconfigure the affected resource, either automatically or based on confirmation from theuser270.
FIG.3 is a detailed system architecture diagram300 of thecloud portal100 in connection with its operations for managing enterprise resources, according to an example embodiment. Reference is also made toFIGS.1 and2 for purposes of the description ofFIG.3. Thecloud portal100 obtains inventory data and supporting content fromdata sources310, appliesuse cases350, and forms a contextualization360.
Thedata sources310 include anenterprise behavior312 generated based on an enterprise'sintent314 andsentiment316. Theenterprise behavior312 represents patterns of use and enterprise for its network/computing equipment and software102(1)-102(N), at various enterprise sites110(1)-110(N) such as implement latest technology or maintain current version for as long as possible.
Thedata sources310 further includeproduct telemetry318 obtained by monitoringproducts320, such as the network/computing equipment and software102(1)-102(N) of the enterprise. Theproduct telemetry318 may include operational states, updates and configuration related data, faults, errors, etc.
Thedata sources310 further includeenterprise data322 obtained fromenterprise contracts324 or service related information such as purchase contracts, service contracts, and warranty service agreements (obtained from a subscription system), andasset information326 that may include data about network/computing equipment and software102(1)-102(N), at various enterprise sites110(1)-110(N). Theenterprise behavior312, theproduct telemetry318 andenterprise data322 are another example of theasset inventory systems210 ofFIG.2.
Thedata sources310 further include aknowledge base328, which is another example of the data andinformation systems230 ofFIG.2. Theknowledge base328 includes contextual information (support material) from a technical assistance center (TAC) service requests (SRs)330,product collateral332, such as instruction manuals and user manuals (product or service guides and documentation),technical sites334, learning and training materials336 (online libraries), and intellectual capital (IC)338 generated based on artificial intelligence (AI)/machine learning (ML)340 anddigitization342 associated with product cases/issues. TheIC338 provides for integrated insights and analytics on one or more resource across dimensions such as health/risk, stability, capacity, and aging.
Theuse cases350 involve filtering the inventory data and supporting content fromdata sources310 to generate contextual information specific to a particular use case scenario of an enterprise. Theuse cases350 may include planning352a, risk analysis352b, solution deployment352c, troubleshooting352d, training and learning352e, configuration update of the enterprise network (software upgrade)352f, etc., that may be custom-generated depending on an enterprise, its resources, and networks.
The contextualization360 involves generatingdigital representations362 of the enterprise environment and providing analytics andinsights366 specific to the enterprise. Some examples of thedigital representations362 include a unified view of the enterprise assets364a,services364b, adoption life cycle (L/C)364c,specialized views364d, etc. Thespecialized views364drepresent distinct dimensions of the context, such as an aggregate representation of the L/C journey across all of the domains, usecases350, and deployments, assets and coverage inventory and install base information, unified and normalized across the domains. A backend platform and data lake system may aggregate disparate sources of information to present these unified views relevant to the enterprise environment.
Some examples of the analytics andinsights366 includeadvisories368a,insights368b, and othercontextual guides368n. Theadvisories368amay be subdivided into categories such as security advisories368a-1, defects368a-2, field notices (FN)368a-3, and others368a-n. Theinsights368bmay also subdivided into categories includingsoftware recommendations368b-1, crash risks368b-2,faults368b-3, andothers368b-n. Thedigital representations362 and analytics andinsights366 are detailed below.
At370, the enterprise data and support content from thedata sources310 are threaded to provide the contextualization360. For example, thedigital representation362 of the enterprise IT environment is generated based on purchased portfolio of hardware/software assets and services from one or more providers obtained from theenterprise data322 of the data sources310. Specifically, the telemetry data, the configuration data from a configuration management database, and service related information from the subscription system is analyzed to generated the unified inventory that represents the enterprise IT environment.
At372, the enterprise data and content from thedata sources310 are filtered to only include data and content relevant to a particular use case from the use cases352a-n.
At374, the contextualization360 is generated to provide a particular one of thespecialized views364d, a particular advisory or a security alert from the advisories368a-1-368a-nor a particular insight or a contextual alert from theinsights368b-1-368b-n.
The contextualization360 may be hierarchical. In one example embodiment, the contextualization360 is presented in a 2- or 3-layer hierarchy. Each layer has its own unique substructure. The first layer represents organizational intent and business outcome of the solution. The second layer includes key aspects or facets of the solution. The third layer is a collection of threaded data structures representing significant properties and characteristics of the selected facet. The contextualization360 ensures the information of the enterprise environment is presented timely and is relevant and useful.
FIG.4 is a screen shot illustrating a high-level view400 or unified view of the enterprise assets364aofFIG.3, according to an example embodiment. Thecloud portal100 contextualizes thedata sources310 to generate the high-level view400, referred to as “My Portfolio.”
The high-level view400 shows assets and coverage aggregated from various domains (enterprise sites110(1)-110(N) ofFIG.1). At various levels of context selection included in the high-level view400, the assets and coverage (along with content in the other facets and views) is shown across all of the enterprise domains. For a user or a network operator logging in without any active access control restrictions, the high-level view400 represents a holistic, cross-domain view of the enterprise hardware/software assets and services purchased from various providers. In the event the user's view is limited by access control policies, the high-level view400 encompasses the top-most aggregation of all domains and assets/services that the user is permitted to view. The high-level view400 includes various facets of an enterprise network, such as anadoption lifecycle facet402, an asset andcoverage facet404, anadvisories facet406, andcases facet408.
Theadoption lifecycle facet402 involves a system for visualizing, presenting, and tracking the status (hybrid vendor/enterprise/telemetry based input) of an enterprise adoption journey with their purchased technology, with integrated learning and support content/resources embedded in context of the enterprise's current/future guided adoption tasks. This informs the enterprise where they are on the adoption journey, as well as next steps, based on telemetry and insights.
The asset andcoverage facet404 is selected in the high-level view400, as an example, and includes anassets category410 and acontacts category412. Theassets category410 shows the total number ofassets420 aggregated across various domains, such as enterprise sites110(1)-110(N), a number ofconnected assets422, anasset coverage424 such as warranty and/or technical support, assets for which the warranty is soon to expire, and assets not covered by any warranty, andasset roles426 such as access, aggregation, branch, core edge in this example scenario.Tools428 provide for manipulation of the high-level view400 and may include features such as “add an asset” and various display filters.
In the high-level view400, theassets category410 is selected and a list ofassets430 is displayed. For example, the list ofassets430 includes the asset name432a, product identification432b, product description432c, number of available advisories orcontextual insights432d,location432e, warranty coverage432f, andother attributes432n. The type of assets434a-nare malware protection (AMP) for endpoints, other software products and hardware products such as network devices. The types and number of assets vary depending on a particular deployment scenario. Tools436 provide for searching, filtering, and changing views of the assets434a-n.
Theadvisories facet406 is described below with reference toFIGS.5-8.
Theopen cases facet408 includes a number of support cases and/or open issues (troubleshooting) for the enterprise. Theopen cases facet408 may include details about all cases or a particular group of cases specific to a particular context and/or use case scenario. The details may include severity, case numbers, title, description of actions taken, duration, status, owner, last update, and so on. Theopen cases facet408 is shown in detail inFIG.10.
FIG.5 is a flow diagram illustrating amethod500 of changing a configuration of at least one affected network resource in an enterprise based on one or more contextual advisories, according to an example embodiment. Themethod500 is performed by thecloud portal100, which is executed by one or more computing devices.
Themethod500 starts at502, in which thecloud portal100 obtains all known advisories (security alerts) from the data andinformation systems230 ofFIG.2 and/or theknowledge base328 ofFIG.3.
At504, thecloud portal100 determines which advisories apply to network resources of an enterprise (assets in theinventory220 ofFIG.2). Optionally, thecloud portal100 further determines which network resources of the enterprise to select based on a user access level. That is, thecloud portal100 determines which network resources can be viewed and/or acted upon by the logged-in user and then selects advisories that apply to the determined network resources. Additionally or alternatively, thecloud portal100 may determine which advisories would apply to the selected network resources based on a user access level. For example, if the logged-in user is a network troubleshooter, only troubleshooting related advisories are selected. On the other hand, if the user is a network administrator, all network related advisories are selected. In short, thecloud portal100 may selected network resources and/or determine level of granularity (specific categories of advisories, specific types of content) based on access controls.
At506, thecloud portal100 discards advisories that do not apply to the network resources and the user access level, thereby generating a set of advisories specific to the inventory of the enterprise.
At508, thecloud portal100 determines whether the generated set of advisories matches user-selectable context in thecloud portal100. By default, users may be provided with the high-level view400 ofFIG.4 that represents the entire enterprise IT environment. The users may then select a particular area (context) of the IT environment using thespecialized views364b-nofFIG.3 and/or based on a particular use case from theuse cases350 ofFIG.3. For example, the user selects to view the security domain, campus networking domain, or all enterprise sites within a particular geographic region.
At510, the advisories that do not apply to the user-selectable context are discarded, thereby generating a first subset of advisories specific to the enterprise's network resources and the context.
At512, thecloud portal100 determines the software version of each affected network resource to which the first subset of advisories applies. The software version may be detected based on theproduct telemetry318 ofFIG.3.
At514, if the affected network resource is running a software version to which the advisory does not apply, the advisory is discarded, thereby generating a second subset of advisories.
At516, thecloud portal100 determines a configuration running on each affected network resource to which the second subset of advisories applies. The configuration may include disabled features and enabled features, determined based on theproduct telemetry318 ofFIG.3.
At518, if the advisory does not apply to the configuration of the affected network resource, the advisory is discarded, thereby generating a final subset of advisories that is specific to configuration of the affected network resources.
At520, thecloud portal100 generates one or more contextual advisories that identifies each of the affected resources, including a configuration that is impacted by a respective advisory from the final subset of advisories.
At522, thecloud portal100 changes the configuration of the one or more affected network resources based on the final subset of advisories, optionally with a confirmation from the user.
The final subset of advisories is specifically tailored to the enterprise network environment, and may include cross-domain data. The final subset of advisories is generated based on an awareness of: a) the enterprise resources, b) context, c) the versions of software the affected resources are running, and d) the features enabled on the affected resources. The final subset of advisories presented ensures that the enterprise has a targeted, relevant, and actionable set of issues to work from and address, resulting in significant time and effort savings. The enterprise need not manually monitor advisory bulletins or subscribe to general advisory email distributions or Really Simple Syndication (RSS) feeds, and analyze the total set of advisories to figure out which advisories impact their environment and which resources are effected and how.
FIG.6 is a screen shot illustrating theadvisories facet406 ofFIG.4, according to an example embodiment. Thecloud portal100 generates theadvisories facet406, which includes asecurity advisories portion602, a field noticesportion604, and abugs portion606, according to one example deployment.
In thesecurity advisories portion602, a number of active advisories and acknowledged advisories are provided. These security advisories are examples of the contextual advisories generated at520 inFIG.5. The user may filter advisories based on context such as security advisories, general, and so on.Additional information608 about the overall security advisories may also be provided, such as the overall impact of the advisories and various timestamps of the advisories as a whole.
A list of the security advisories610a-nincludes individual general information for each security advisory. The individual general information may include a title612a, animpact612b, common vulnerabilities and exposures (CVE) information612c, atime stamp612dsuch as the last update, a version612e, a number of affected resources612f, a number of potentially affected network resources (potentially affected resources)612g, and other attributes612n.
Thesecurity advisories portion602 demonstrates one level of data threading from various backend systems and platforms such as the telemetry data from cloud agents/collectors and underlying product telemetry, IC engines, and advisory databases, described inFIGS.2 and3.
By selecting one of the security advisories610a-n, thecloud portal100 generates the next level of data that provides specific information about the selected security advisory.
FIG.7 is a screen shot illustrating, for a selectedsecurity advisory700, affected assets712a-n, according to an example embodiment. The selectedsecurity advisory700 includes some of thegeneral information702 about the selectedsecurity advisory700 that may include its criticality, a CVE identification, a CVE score, version and state (active, acknowledged, implemented, inactive, and so on), date and bug identifiers. Additionally,advisory tools704 to acknowledge the selectedsecurity advisory700 may be provided, which would move the selectedsecurity advisory700 to an acknowledged category in thesecurity advisories portion602 ofFIG.6.
The selectedsecurity advisory700 includes asummary portion706, anaffected assets portion708, and a potentially affectedassets portion710. Thesummary portion706 includes advisory details or summary information that may be threaded from the data and information systems230 (the e-learning libraries236) ofFIG.2 and/or the knowledge base328 (technical sites334) ofFIG.3.
The affectedassets portion708 and the potentially affectedassets portion710 are specific to the enterprise and are generated based on the resources in theinventory220.
The affectedassets portion708 includes the total number of affected assets (4) and information714a-nabout each of the affected assets712a-n. The information714a-nincludes an asset name714a, anIP address714band/or location of the asset such as the enterprise site110(1), a product identification (ID)714c, a software release714d, andother attributes714n.Manipulation tools716 may provide for filtering the affected assets712a-nbased on various criteria and/or for exporting the list of affected assets712a-nto a file (comma-separated values (CSV) file) such as theoffline spreadsheets218 ofFIG.2.Resource tools718 may provide for acknowledging or dismissing the selectedsecurity advisory700 for a particular asset.
By selecting one of the affected assets712a-nsuch as thefirst asset712a, thecloud portal100 generates the next level of data that includes reasons720 (explanation for applying the selectedsecurity advisory700 to thefirst asset712a) and additional notes722 (actions or tasks to perform). In one example, thereasons720 include that the asset matches the software type, software release, and configuration features. Thereasons720 may further include details about the software type, release, and configuration features that matched. Theadditional notes722 may provide an action plan to fix the security vulnerability identified in the selectedsecurity advisory700 such as confirm an access control list (ACL) on a Simple Network Management Protocol (SNMP) community to filter incoming SNMP requests to ensure that SNMP queries are performed only by trusted SNMP clients. Although not shown, action tools to perform the action plan may also be provided. By manipulating the action tools, thecloud portal100 changes the configuration of the affectedfirst asset712abased on the action plan.
When the user selects the potentially affectedassets portion710, thecloud portal100 outputs a list of the potentially affected assets.
FIG.8 is a screen shot illustrating potentially affected assets812a-nof the selectedsecurity advisory700, according to an example embodiment. When the user selects the potentially affectedassets portion710, thecloud portal100 outputs a list of the potentially affected assets812a-n, which may further include the total number of the potentially affected assets (6).
The affectedassets portion710 provides analogous general information714a-nfor the potentially affected resources812a-n. This is just one use case scenario and the information may be different from the information714a-n(include or exclude some of the attributes).
By selecting the first potentially affectedasset812afrom the list of the potentially affected assets812a-n, thecloud portal100 generates the next level of data that includesreasons814 or explanation why the selectedsecurity advisory700 may potentially apply and additional notes816 (action plan).
Thereasons814 include matched information and missing information to determine whether the first potentially affectedasset812ais an affected asset. For example, the first potentially affectedasset812amatches the software type and the software release but the configuration features are unknown. Thecloud portal100 could not locate the running configuration of the first potentially affectedasset812a.Missing data tools815 may be provided to help thecloud portal100 locate the missing data. For example, permission for thecloud portal100 to access a configuration file of the first potentially affectedasset812amay be granted via the missingdata tools815 and thecloud portal100 then collects the missing data to definitively classify the first potentially affectedasset812aas affected or not.
Theadditional notes816 may identify the actions needed to fix the security vulnerability. For example, confirm an access control list (ACL) on a Simple Network Management Protocol (SNMP) community to filter incoming SNMP requests to ensure that SNMP queries are performed only by trusted SNMP clients. Although not shown, action tools to perform the needed actions may be provided. In other words, instead of definitively determining whether the first potentially affectedasset812ais affected or not, the user may try to perform the needed actions by manipulating the action tool.
FIG.9 is a flow diagram illustrating a method900 of changing a configuration of at least one affected network resource in an enterprise based on one or more support guides, according to an example embodiment. The method900 is performed by thecloud portal100, which is executed by one or more computing devices. The method900 refines and tailors the support material specific to the enterprise given the current context and a stage of adoption.
The method900 starts at902, in which thecloud portal100 obtains all known supporting material or content (contextual alerts and product support information) from the data andinformation systems230 ofFIG.2 and/or theknowledge base328 ofFIG.3.
At904, thecloud portal100 determines which content applies to the network resources of an enterprise. That is, thecloud portal100 selects support material (contextual data set) that applies to the assets in theinventory220 ofFIG.2. Optionally, thecloud portal100 uses access controls to select network resources from the network resources of the enterprise that the logged-in user can view and act upon and/or to select specific categories and type of content. For example, if the logged-in user is a network troubleshooter, only troubleshooting related content (troubleshooting contextual data set) is selected. On the other hand, if the user is a network administrator, all network related content (network related contextual data set) is selected.
At906, thecloud portal100 discards content that does not apply to the network resources and to the user access level, thereby generating a support material set specific to the network resources of the enterprise.
At908, thecloud portal100 determines whether the generated support material set matches user-selectable context in thecloud portal100. By default, the users are provided with the high-level view400 ofFIG.4 that represents the entire IT environment of the enterprise. The users may then select a particular area (context) usingspecialized views364b-nofFIG.3 and/or a particular geographic area or sites. For example, the user may select to view the security domain or the campus-network domain, or all enterprise sites within a particular geographic region.
At910, the content that does not apply to the user-selectable context are discarded, thereby generating a first support material subset specific to the selected context.
At912, thecloud portal100 determines whether the first support material subset matches available and active use cases. The use cases are the outcomes that an enterprise is driving towards, and are obtained from theenterprise behavior312 referred to above in connection withFIG.3. The use cases provide the reasoning as to why the enterprise is using the technology, what capabilities are to be achieved, what the enterprise is to gain through the usage of this technology.
At914, if content of the first support material subset does not match available and active use cases (the outcome the enterprise is trying to achieve), the content is discarded, thereby generating a second support material subset.
At916, thecloud portal100 determines if the content in the second support material subset matches a current stage (a particular stage) or task in an adoption lifecycle journey of the particular resource affected by the content. The adoption lifecycle may encompass the end-to-end journey stages such as: need, evaluate, select, align, purchase, onboard, implement, use, engage, adopt, optimize, recommend, advocate, and accelerate. Based on the stage in the adoption lifecycle, certain activities and a certain type of support materials are determined to be most relevant.
At918, the content in the second support material subset that does not match the current stage (the particular stage) or task in the adaption journey is discarded, thereby generating a final support material subset that is specifically tailored to the enterprise network, context, use cases, and current stages in the adoption journey.
At920, thecloud portal100 generates one or more support guides that identifies affected resources of the enterprise network, including an affected configuration of the resources in their current stages.
At922, thecloud portal100 may change the configuration of the one or more network resources or products based on the support guides by performing one or more actions in the support guides, optionally, with a confirmation from the user.
FIG.10 is a screen shot illustrating thecases facet408 of the contextualization of the network resources of the enterprise, according to an example embodiment. Thecloud portal100 may generate another layer of contextualization with a user-selectable context for all views. Thecases facet408 represents all support cases across various enterprise sites110(1)-110(N) of the enterprise IT environment, which the user is authorized to view. However, as the user selects a more specific context such as the Campus Network success track/domain, the context changes to render just the support cases applicable to assets within the Campus Network context. This same paradigm is easily extended to other ways the user may segment the enterprise network as a means of establishing context, including sites and pre-defined/user-defined asset groups.
Thecases facet408 shows that there are 127 open cases. The user may then select to view allopen cases1002 or open cases assigned to the user (my open cases)1004. If the user selects to view myopen cases1004, thecloud portal100 generates the next level of information about myopen cases1004 that includes thetotal number1006 of open cases (forty nine cases), thecollective status1008 of the cases (pending with the provider, pending with the enterprise, new) and thecollective severity1010 of the myopen cases1004. Thecloud portal100 may further generate various time relatedgraphs1012 that show last updates and collective durations of the open cases, and so on. Thecloud portal100 generates a list of open cases1014a-nand information about each that may include theseverity1016a, acase number1016b, atitle1016c, astatus1016d, an owner1016e(user assigned to the case), a time stamp (the last update)1016f, and other information1016nsuch as additional details about the open case and/or links to related support guides. The user may select a particular case to view the details of the case and the affected resources.Tools1018 are further provided to generate a new case.
Thecloud portal100 may also render the support guides asinsights1020. Thecloud portal100 threads data from multiple sources into various contextualized representations derived from various combinations of purchase and contract data from commerce tools, telemetry data from cloud agents/collectors and underlying product telemetry, as well as inventory data sources provided by the enterprise through mechanisms such as automated CMDB uploads or manual asset entry. At the specific asset level, a suite of data sources is integrated, by thecloud portal100, to present a unified view of the asset across numerous dimensions.
FIG.11 is a screen shot illustrating an individualasset level view1100 of contextualization, according to an example embodiment. By selecting one of the network resources434a-nofFIG.4, such as the switch434b, thecloud portal100 generates the individualasset level view1100 in which information about the switch434bis provided. The information is generated by threading data from multiple disparate sources.
The individualasset level view1100 includes the status1102 (connected, not connected, etc.), level or tier of support coverage applied to theasset1104, and a time stamp1106 (when the last telemetry data was collected).Individual asset tools1108 provide for running a diagnostic scan on the switch434band/or opening a new case, for example, for troubleshooting a problem.
The individualasset level view1100 may further provide specific information about the switch434b, split into various portions or levels such as asummary portion1110a, ahardware portion1110b, a software portion1110c, adocumentation portion1110d, an applicable advisories portion1110e, andother portions1110n.
Thesummary portion1110aincludes various information about this type of the asset such as thenumber1112aof the switch434bin the inventory (3) and image, and attributes1112b, and grouping or location relatedinformation1112c.
Theattributes1112bmay include: when and how the switch434bwas discovered or added, the product family, the product type, the product identification, the software type, the software version (release), the connected devices information (controller information to which the switch434bis connected), when coverage or support for the switch434bexpires, support coverage type, and other warranty and support related information.
The grouping or location relatedinformation1112cmay include installation locations of the switch434bsuch as geographic locations, enterprise sites110(1)-(N), asset groups and so on.
Thecloud portal100 threads various data from disparate sources to generate a holistic end-to-end view of the asset (the individual asset level view1100) that includes its attributes, related objects, and correlations, thereby unlocking unique possibilities to proactively alert the enterprise to relevant insights and remediation opportunities. For instance, if an asset is missing a license (telemetry data) to enable purchased feature sets (purchase data), contextual help resources (product guides, e-learning, community forum posts) can be presented in-context to guide the customer on best practices for applying and enabling licenses for this asset. As another example, based on a degree of risk (determined by IC engines) associated with running an old version of software (Obtained from the telemetry data), and based on the enabled feature sets on an asset such as a router (obtained from the telemetry data), a recommended version of software (IC engine) can be presented along with contextual help resources for how to perform the upgrade (product guides, e-learning) in accordance with best practices.
The techniques presented herein unify disparate cross-domain data including enterprise's behavior, product telemetry, enterprise network or IT data, and a knowledge base and generate holistic and contextualized digital representations of the enterprise IT environment. The techniques presented herein further thread the disparate cross-domain data to support targeted enterprise use cases to unlock and enable enterprise success of managing its IT environment.
FIG.12 is a flowchart illustrating amethod1200 of generating one or more contextual guides specific to one or more affected network resources of an enterprise, according to an example embodiment. Themethod1200 may be implemented by a computing device such as a server or a group of servers that execute thecloud portal100 ofFIG.1.
At1202, themethod1200 involves obtaining, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network. The inventory data includes configuration information of the enterprise network.
At1204, themethod1200 involves selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks.
At1206, themethod1200 involves generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
In one form, themethod1200 may further involve changing a configuration of at least one of the one or more affected network resources based at least in part on the one or more contextual guides.
In another form, themethod1200 may further involve obtaining the contextual information that includes contextual alerts and/or product support information, from one or more knowledge databases that include: one or more advisory information systems, one or more community forums, one or more online libraries, one or more support case management platforms, one or more content management systems, and one or more product or service guides and documentation.
In themethod1200, theoperation1202 of obtaining the inventory data of the enterprise network may include aggregating the plurality of network resources deployed in the plurality of domains of the enterprise network into a unified inventory. The plurality of network resources including network devices and software services deployed in each of the plurality of domains. Theoperation1202 of obtaining the inventory data of the enterprise network may further include obtaining configuration and feature related information for each of the plurality of network resources and software services.
According to one or more example embodiments, theoperation1202 of obtaining the inventory data of the enterprise network may include obtaining: telemetry data of the enterprise network, configuration data from a configuration management database of the enterprise network, service related information from a subscription system. Themethod1200 may further involve analyzing the telemetry data, the configuration data, and the service related information, to generate the unified inventory of the enterprise network.
In themethod1200, theoperation1204 of selecting the one or more contextual insights from the contextual information may include determining a contextual data set from the contextual information that applies to one or more of the network devices and software services based on the service related information and the telemetry data and selecting the one or more contextual insights from the contextual data set that applies to the configuration and feature related information based on the telemetry data.
According to one or more example embodiments, selecting the one or more contextual insights may further include obtaining a use case, input by a network operator, where the use case is one of a risk analysis of the enterprise network, troubleshooting of the enterprise network, and a configuration update of the enterprise network, and selecting the one or more contextual insights from the contextual data set that applies to the use case.
In themethod1200, theoperation1206 of generating the one or more contextual guides may include generating one or more security alerts related to the one or more affected network resources and one or more potentially affected network resources of the enterprise network. The one or more security alerts may include identification, location, and configuration information for each network resource indicated in the one or more security alerts.
In one form, theoperation1206 of generating the one or more contextual guides may include generating a support guide related to configuring the one or more affected network resources and that includes identification, location, and feature-related information for each network resources indicated in the support guide.
In another form, theoperation1206 of generating the one or more contextual guides may further be based on an access level of an operator and may be applicable to at least two network resources from different domains of the enterprise network.
In one instance, theoperation1204 of selecting one or more contextual insights may include collecting telemetry data of a resource of the plurality of network resources deployed in the enterprise network, determining a particular stage, from a plurality of stages in an adoption lifecycle journey of the resource, based on the telemetry data, and selecting the one or more contextual insights that apply to the particular stage.
FIG.13 is a hardware block diagram of acomputing device1300 that may perform functions associated with any combination of operations in connection with the techniques depicted and described inFIGS.1-12, including, but not limited to, operations of the computing device or one or more servers that execute thecloud portal100. Further, thecomputing device1300 may be representative of one of the network devices. It should be appreciated thatFIG.13 provides only an illustration of one embodiment and does not imply any limitations with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environment may be made.
In at least one embodiment,computing device1300 may include one or more processor(s)1302, one or more memory element(s)1304, storage1306, abus1308, one or more network processor unit(s)1310 interconnected with one or more network input/output (I/O) interface(s)1312, one or more I/O interface(s)1314, andcontrol logic1320. In various embodiments, instructions associated with logic forcomputing device1300 can overlap in any manner and are not limited to the specific allocation of instructions and/or operations described herein.
In at least one embodiment, processor(s)1302 is/are at least one hardware processor configured to execute various tasks, operations and/or functions forcomputing device1300 as described herein according to software and/or instructions configured forcomputing device1300. Processor(s)1302 (e.g., a hardware processor) can execute any type of instructions associated with data to achieve the operations detailed herein. In one example, processor(s)1302 can transform an element or an article (e.g., data, information) from one state or thing to another state or thing. Any of potential processing elements, microprocessors, digital signal processor, baseband signal processor, modem, PHY, controllers, systems, managers, logic, and/or machines described herein can be construed as being encompassed within the broad term ‘processor’.
In at least one embodiment, one or more memory element(s)1304 and/or storage1306 is/are configured to store data, information, software, and/or instructions associated withcomputing device1300, and/or logic configured for memory element(s)1304 and/or storage1306. For example, any logic described herein (e.g., control logic1320) can, in various embodiments, be stored forcomputing device1300 using any combination of memory element(s)1304 and/or storage1306. Note that in some embodiments, storage1306 can be consolidated with one or more memory elements1304 (or vice versa), or can overlap/exist in any other suitable manner.
In at least one embodiment,bus1308 can be configured as an interface that enables one or more elements ofcomputing device1300 to communicate in order to exchange information and/or data.Bus1308 can be implemented with any architecture designed for passing control, data and/or information between processors, memory elements/storage, peripheral devices, and/or any other hardware and/or software components that may be configured forcomputing device1300. In at least one embodiment,bus1308 may be implemented as a fast kernel-hosted interconnect, potentially using shared memory between processes (e.g., logic), which can enable efficient communication paths between the processes.
In various embodiments, network processor unit(s)1310 may enable communication betweencomputing device1300 and other systems, entities, etc., via network I/O interface(s)1312 to facilitate operations discussed for various embodiments described herein. In various embodiments, network processor unit(s)1310 can be configured as a combination of hardware and/or software, such as one or more Ethernet driver(s) and/or controller(s) or interface cards, Fibre Channel (e.g., optical) driver(s) and/or controller(s), and/or other similar network interface driver(s) and/or controller(s) now known or hereafter developed to enable communications betweencomputing device1300 and other systems, entities, etc. to facilitate operations for various embodiments described herein. In various embodiments, network I/O interface(s)1312 can be configured as one or more Ethernet port(s), Fibre Channel ports, and/or any other I/O port(s) now known or hereafter developed. Thus, the network processor unit(s)1310 and/or network I/O interface(s)1312 may include suitable interfaces for receiving, transmitting, and/or otherwise communicating data and/or information in a network environment.
I/O interface(s)1314 allow for input and output of data and/or information with other entities that may be connected to thecomputing device1300. For example, I/O interface(s)1314 may provide a connection to external devices such as a keyboard, keypad, a touch screen, and/or any other suitable input device now known or hereafter developed. In some instances, external devices can also include portable computer readable (non-transitory) storage media such as database systems, thumb drives, portable optical or magnetic disks, and memory cards. In still some instances, external devices can be a mechanism to display data to a user, such as, for example, acomputer monitor1316, a display screen, or the like.
In various embodiments,control logic1320 can include instructions that, when executed, cause processor(s)1302 to perform operations, which can include, but not be limited to, providing overall control operations of computing device; interacting with other entities, systems, etc. described herein; maintaining and/or interacting with stored data, information, parameters, etc. (e.g., memory element(s), storage, data structures, databases, tables, etc.); combinations thereof; and/or the like to facilitate various operations for embodiments described herein.
In another example embodiment, an apparatus is provided such as the computing device executing thecloud portal100 ofFIG.1. The apparatus includes a memory, a network interface configured to enable network communications, and a processor. The processor is configured to perform various operations. The operations include obtaining, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network. The inventory data includes configuration information of the enterprise network. The operations further include selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks and generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
In yet another example embodiment, one or more non-transitory computer readable storage media encoded with instructions are provided. When the media is executed by a processor, the instructions cause the processor to execute a method involving obtaining, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network. The inventory data includes configuration information of the enterprise network. The method further involves selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks and generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
In yet another example embodiment, a system is provided that includes the devices and operations explained above with reference toFIGS.1-13.
The programs described herein (e.g., control logic1320) may be identified based upon the application(s) for which they are implemented in a specific embodiment. However, it should be appreciated that any particular program nomenclature herein is used merely for convenience, and thus the embodiments herein should not be limited to use(s) solely described in any specific application(s) identified and/or implied by such nomenclature.
In various embodiments, entities as described herein may store data/information in any suitable volatile and/or non-volatile memory item (e.g., magnetic hard disk drive, solid state hard drive, semiconductor storage device, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM), application specific integrated circuit (ASIC), etc.), software, logic (fixed logic, hardware logic, programmable logic, analog logic, digital logic), hardware, and/or in any other suitable component, device, element, and/or object as may be appropriate. Any of the memory items discussed herein should be construed as being encompassed within the broad term ‘memory element’. Data/information being tracked and/or sent to one or more entities as discussed herein could be provided in any database, table, register, list, cache, storage, and/or storage structure: all of which can be referenced at any suitable timeframe. Any such storage options may also be included within the broad term ‘memory element’ as used herein.
Note that in certain example implementations, operations as set forth herein may be implemented by logic encoded in one or more tangible media that is capable of storing instructions and/or digital information and may be inclusive of non-transitory tangible media and/or non-transitory computer readable storage media (e.g., embedded logic provided in: an ASIC, digital signal processing (DSP) instructions, software [potentially inclusive of object code and source code], etc.) for execution by one or more processor(s), and/or other similar machine, etc. Generally, the storage1306 and/or memory elements(s)1304 can store data, software, code, instructions (e.g., processor instructions), logic, parameters, combinations thereof, and/or the like used for operations described herein. This includes the storage1306 and/or memory elements(s)1304 being able to store data, software, code, instructions (e.g., processor instructions), logic, parameters, combinations thereof, or the like that are executed to carry out operations in accordance with teachings of the present disclosure.
In some instances, software of the present embodiments may be available via a non-transitory computer useable medium (e.g., magnetic or optical mediums, magneto-optic mediums, CD-ROM, DVD, memory devices, etc.) of a stationary or portable program product apparatus, downloadable file(s), file wrapper(s), object(s), package(s), container(s), and/or the like. In some instances, non-transitory computer readable storage media may also be removable. For example, a removable hard drive may be used for memory/storage in some implementations. Other examples may include optical and magnetic disks, thumb drives, and smart cards that can be inserted and/or otherwise connected to a computing device for transfer onto another computer readable storage medium.
Embodiments described herein may include one or more networks, which can represent a series of points and/or network elements of interconnected communication paths for receiving and/or transmitting messages (e.g., packets of information) that propagate through the one or more networks. These network elements offer communicative interfaces that facilitate communications between the network elements. A network can include any number of hardware and/or software elements coupled to (and in communication with) each other through a communication medium. Such networks can include, but are not limited to, any local area network (LAN), virtual LAN (VLAN), wide area network (WAN) (e.g., the Internet), software defined WAN (SD-WAN), wireless local area (WLA) access network, wireless wide area (WWA) access network, metropolitan area network (MAN), Intranet, Extranet, virtual private network (VPN), Low Power Network (LPN), Low Power Wide Area Network (LPWAN), Machine to Machine (M2M) network, Internet of Things (IoT) network, Ethernet network/switching system, any other appropriate architecture and/or system that facilitates communications in a network environment, and/or any suitable combination thereof.
Networks through which communications propagate can use any suitable technologies for communications including wireless communications (e.g., 4G/5G/nG, IEEE 802.11 (e.g., Wi-Fi®/Wi-Fi6®), IEEE 802.16 (e.g., Worldwide Interoperability for Microwave Access (WiMAX)), Radio-Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth™, mm·wave, Ultra-Wideband (UWB), etc.), and/or wired communications (e.g., T1 lines, T3 lines, digital subscriber lines (DSL), Ethernet, Fibre Channel, etc.). Generally, any suitable means of communications may be used such as electric, sound, light, infrared, and/or radio to facilitate communications through one or more networks in accordance with embodiments herein. Communications, interactions, operations, etc. as discussed for various embodiments described herein may be performed among entities that may directly or indirectly connected utilizing any algorithms, communication protocols, interfaces, etc. (proprietary and/or non-proprietary) that allow for the exchange of data and/or information.
Communications in a network environment can be referred to herein as ‘messages’, ‘messaging’, ‘signaling’, ‘data’, ‘content’, ‘objects’, ‘requests’, ‘queries’, ‘responses’, ‘replies’, etc. which may be inclusive of packets. As referred to herein, the terms may be used in a generic sense to include packets, frames, segments, datagrams, and/or any other generic units that may be used to transmit communications in a network environment. Generally, the terms reference to a formatted unit of data that can contain control or routing information (e.g., source and destination address, source and destination port, etc.) and data, which is also sometimes referred to as a ‘payload’, ‘data payload’, and variations thereof. In some embodiments, control or routing information, management information, or the like can be included in packet fields, such as within header(s) and/or trailer(s) of packets. Internet Protocol (IP) addresses discussed herein and in the claims can include any IP version 4 (IPv4) and/or IP version 6 (IPv6) addresses.
To the extent that embodiments presented herein relate to the storage of data, the embodiments may employ any number of any conventional or other databases, data stores or storage structures (e.g., files, databases, data structures, data or other repositories, etc.) to store information.
Note that in this Specification, references to various features (e.g., elements, structures, nodes, modules, components, engines, logic, steps, operations, functions, characteristics, etc.) included in ‘one embodiment’, ‘example embodiment’, ‘an embodiment’, ‘another embodiment’, ‘certain embodiments’, ‘some embodiments’, ‘various embodiments’, ‘other embodiments’, ‘alternative embodiment’, and the like are intended to mean that any such features are included in one or more embodiments of the present disclosure, but may or may not necessarily be combined in the same embodiments. Note also that a module, engine, client, controller, function, logic or the like as used herein in this Specification, can be inclusive of an executable file comprising instructions that can be understood and processed on a server, computer, processor, machine, compute node, combinations thereof, or the like and may further include library modules loaded during execution, object files, system files, hardware logic, software logic, or any other executable modules.
It is also noted that the operations and steps described with reference to the preceding figures illustrate only some of the possible scenarios that may be executed by one or more entities discussed herein. Some of these operations may be deleted or removed where appropriate, or these steps may be modified or changed considerably without departing from the scope of the presented concepts. In addition, the timing and sequence of these operations may be altered considerably and still achieve the results taught in this disclosure. The preceding operational flows have been offered for purposes of example and discussion. Substantial flexibility is provided by the embodiments in that any suitable arrangements, chronologies, configurations, and timing mechanisms may be provided without departing from the teachings of the discussed concepts.
As used herein, unless expressly stated to the contrary, use of the phrase ‘at least one of’, ‘one or more of’, ‘and/or’, variations thereof, or the like are open-ended expressions that are both conjunctive and disjunctive in operation for any and all possible combination of the associated listed items. For example, each of the expressions ‘at least one of X, Y and Z’, ‘at least one of X, Y or Z’, ‘one or more of X, Y and Z’, ‘one or more of X, Y or Z’ and ‘X, Y and/or Z’ can mean any of the following: 1) X, but not Y and not Z; 2) Y, but not X and not Z; 3) Z, but not X and not Y; 4) X and Y, but not Z; 5) X and Z, but not Y; 6) Y and Z, but not X; or 7) X, Y, and Z.
Additionally, unless expressly stated to the contrary, the terms ‘first’, ‘second’, ‘third’, etc., are intended to distinguish the particular nouns they modify (e.g., element, condition, node, module, activity, operation, etc.). Unless expressly stated to the contrary, the use of these terms is not intended to indicate any type of order, rank, importance, temporal sequence, or hierarchy of the modified noun. For example, ‘first X’ and ‘second X’ are intended to designate two ‘X’ elements that are not necessarily limited by any order, rank, importance, temporal sequence, or hierarchy of the two elements. Further as referred to herein, ‘at least one of’ and ‘one or more of’ can be represented using the ‘(s)’ nomenclature (e.g., one or more element(s)).
One or more advantages described herein are not meant to suggest that any one of the embodiments described herein necessarily provides all of the described advantages or that all the embodiments of the present disclosure necessarily provide any one of the described advantages. Numerous other changes, substitutions, variations, alterations, and/or modifications may be ascertained to one skilled in the art and it is intended that the present disclosure encompass all such changes, substitutions, variations, alterations, and/or modifications as falling within the scope of the appended claims.

Claims (20)

What is claimed is:
1. A method comprising:
obtaining, by a computing device from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network, the inventory data including configuration information of the enterprise network;
selecting, by the computing device, one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks by:
collecting telemetry data of a resource of the plurality of network resources deployed in the enterprise network,
determining a current stage of the resource, from a plurality of stages in an adoption lifecycle journey of the resource, based on the telemetry data, wherein the plurality of stages in the adoption lifecycle journey relate to obtaining, onboarding, using, and optimizing the resource within the enterprise network, and
selecting the one or more contextual insights that apply to the current stage of the resource, from the contextual information stored in a knowledge database, wherein the one or more contextual insights are support material including one or more of contextual alerts and product support information obtained from the knowledge database; and
generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
2. The method ofclaim 1, further comprising:
changing, by the computing device, a configuration of at least one of the one or more affected network resources based at least in part on the one or more contextual guides.
3. The method ofclaim 1, further comprising:
obtaining the contextual information that includes the contextual alerts and/or the product support information stored in, one or more knowledge databases that include:
one or more advisory information systems,
one or more community forums,
one or more online libraries,
one or more support case management platforms,
one or more content management systems, and
one or more product or service guides and documentation.
4. The method ofclaim 1, wherein obtaining the inventory data of the enterprise network includes:
aggregating the plurality of network resources deployed in the plurality of domains of the enterprise network into a unified inventory, the plurality of network resources including a plurality of network devices and a plurality of software services deployed in each of the plurality of domains; and
obtaining configuration and feature related information for each of the plurality of network devices and the plurality of software services.
5. The method ofclaim 4, wherein obtaining the inventory data of the enterprise network further includes obtaining:
enterprise network related telemetry data,
configuration data from a configuration management database of the enterprise network, and service related information from a subscription system, and
the method further comprising:
analyzing the telemetry data, the configuration data, and the service related information, to generate the unified inventory of the enterprise network.
6. The method ofclaim 5, wherein selecting the one or more contextual insights from the contextual information further includes:
determining a contextual data set from the contextual information that applies to one or more of the plurality of network devices and the plurality of software services based on the service related information and the telemetry data; and
selecting the one or more contextual insights from the contextual data set that applies to the configuration and feature related information based on the telemetry data.
7. The method ofclaim 6, wherein selecting the one or more contextual insights further includes:
obtaining a use case, input by a network operator, wherein the use case is one of a risk analysis of the enterprise network, troubleshooting of the enterprise network, and a configuration update of the enterprise network; and
selecting the one or more contextual insights from the contextual data set that applies to the use case.
8. The method ofclaim 1, wherein generating the one or more contextual guides includes:
generating one or more security alerts related to the one or more affected network resources and one or more potentially affected network resources of the enterprise network, wherein the one or more security alerts include identification, location, and configuration information for each network resource indicated in the one or more security alerts.
9. The method ofclaim 1, wherein generating the one or more contextual guides includes:
generating a support guide related to configuring the one or more affected network resources and that includes identification, location, and feature-related information for each network resource indicated in the support guide.
10. The method ofclaim 1, wherein generating the one or more contextual guides is further based on an access level of an operator and applies to at least two network resources from different domains of the enterprise network.
11. The method ofclaim 1, wherein generating the one or more contextual guides includes determining one or more categories for the one or more contextual guides based on a user access level within the enterprise network.
12. An apparatus comprising:
a memory;
a network interface configured to enable network communications; and
a processor, wherein the processor is configured to perform operations comprising:
obtaining, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network, the inventory data including configuration information of the enterprise network;
selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks by:
collecting telemetry data of a resource of the plurality of network resources deployed in the enterprise network,
determining a current stage of the resource, from a plurality of stages in an adoption lifecycle journey of the resource, based on the telemetry data, wherein the plurality of stages in the adoption lifecycle journey relate to obtaining, onboarding, using, and optimizing the resource within the enterprise network, and
selecting the one or more contextual insights that apply to the current stage of the resource, from the contextual information stored in a knowledge database, wherein the one or more contextual insights are support material including one or more of contextual alerts and product support information obtained from the knowledge database; and
generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
13. The apparatus ofclaim 12, wherein the processor is further configured to perform:
changing a configuration of at least one of the one or more affected network resources based at least in part on the one or more contextual guides.
14. The apparatus ofclaim 12, wherein the processor is further configured to perform:
obtaining the contextual information that includes the contextual alerts and/or the product support information stored in one or more knowledge databases that include:
one or more advisory information systems,
one or more community forums,
one or more online libraries,
one or more support case management platforms,
one or more content management systems, and
one or more product or service guides and documentation.
15. The apparatus ofclaim 12, wherein the processor is configured to perform the operation of obtaining the inventory data of the enterprise network by:
aggregating the plurality of network resources deployed in the plurality of domains of the enterprise network into a unified inventory, the plurality of network resources including a plurality of network devices and a plurality of software services deployed in each of the plurality of domains; and
obtaining configuration and feature related information for each of the plurality of network devices and the plurality of software services.
16. The apparatus ofclaim 15, wherein the processor is configured to perform the operation of obtaining the inventory data of the enterprise network by obtaining:
enterprise network telemetry data,
configuration data from a configuration management database of the enterprise network, and service related information from a subscription system, and
wherein the processor is further configured to perform:
analyzing the telemetry data, the configuration data, and the service related information, to generate the unified inventory of the enterprise network.
17. One or more non-transitory computer readable storage media encoded with instructions that, when executed by a processor, cause the processor to execute a method comprising:
obtaining, from one or more disparate data sources, inventory data of a plurality of network resources in a plurality of domains of an enterprise network, the inventory data including configuration information of the enterprise network;
selecting one or more contextual insights that apply to the inventory data of the enterprise network from contextual information related to one or more networks and configuration of the one or more networks by:
collecting telemetry data of a resource of the plurality of network resources deployed in the enterprise network,
determining a current stage of the resource, from a plurality of stages in an adoption lifecycle journey of the resource, based on the telemetry data, wherein the plurality of stages in the adoption lifecycle journey relate to obtaining, onboarding, using, and optimizing the resource within the enterprise network, and
selecting the one or more contextual insights that apply to the current stage of the resource, from the contextual information stored in a knowledge database, wherein the one or more contextual insights are support material including one or more of contextual alerts and product support information obtained from the knowledge database; and
generating one or more contextual guides specific to one or more affected network resources of the enterprise network based on the one or more contextual insights.
18. The one or more non-transitory computer readable storage media ofclaim 17, wherein the method further comprises:
changing a configuration of at least one of the one or more affected network resources based at least in part on the one or more contextual guides.
19. The one or more non-transitory computer readable storage media ofclaim 17, wherein the method further comprises:
obtaining the contextual information that includes the contextual alerts and/or the product support information stored in one or more knowledge databases that include:
one or more advisory information systems,
one or more community forums,
one or more online libraries,
one or more support case management platforms,
one or more content management systems, and
one or more product or service guides and documentation.
20. The one or more non-transitory computer readable storage media ofclaim 17, wherein obtaining the inventory data of the enterprise network includes:
aggregating the plurality of network resources deployed in the plurality of domains of the enterprise network into a unified inventory, the plurality of network resources including a plurality of network devices and a plurality of software services deployed in each of the plurality of domains; and
obtaining configuration and feature related information for each of the plurality of network devices and the plurality of software services.
US17/395,1672020-12-212021-08-05Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)Active2041-09-23US11777799B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US17/395,167US11777799B2 (en)2020-12-212021-08-05Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)
US18/354,011US12301416B2 (en)2020-12-212023-07-18Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US202063128463P2020-12-212020-12-21
US17/395,167US11777799B2 (en)2020-12-212021-08-05Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US18/354,011ContinuationUS12301416B2 (en)2020-12-212023-07-18Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Publications (2)

Publication NumberPublication Date
US20220200928A1 US20220200928A1 (en)2022-06-23
US11777799B2true US11777799B2 (en)2023-10-03

Family

ID=82021855

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US17/395,167Active2041-09-23US11777799B2 (en)2020-12-212021-08-05Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)
US17/410,551ActiveUS11677623B2 (en)2020-12-212021-08-24System for managing adoption lifecycle of networking and computing equipment
US18/354,011Active2041-08-12US12301416B2 (en)2020-12-212023-07-18Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US17/410,551ActiveUS11677623B2 (en)2020-12-212021-08-24System for managing adoption lifecycle of networking and computing equipment
US18/354,011Active2041-08-12US12301416B2 (en)2020-12-212023-07-18Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Country Status (1)

CountryLink
US (3)US11777799B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230362054A1 (en)*2020-12-212023-11-09Cisco Technology, Inc.Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12271867B1 (en)*2020-02-102025-04-08State Farm Mutual Automobile Insurance CompanyPredicting resource lifecycles and managing resources in enterprise networks
US11917025B2 (en)*2021-08-302024-02-27Cisco Technology, Inc.System for lifecycle progression leveraging adoption journey of networking and computing equipment
US11595324B1 (en)*2021-10-012023-02-28Bank Of America CorporationSystem for automated cross-network monitoring of computing hardware and software resources
US11888690B2 (en)2022-01-072024-01-30Dell Products L.P.System and method for subscription limitation enforcement in distributed system
US12093102B2 (en)2022-01-072024-09-17Dell Products L.P.System and method for power state enforced subscription management
US11947433B2 (en)*2022-01-072024-04-02Dell Products L.P.System and method for subscription based solution management
US11907153B2 (en)2022-01-072024-02-20Dell Products L.P.System and method for distributed subscription management
US12211021B2 (en)2022-01-072025-01-28Dell Products L.P.System and method for subscription based solution implementation
US12184516B2 (en)*2022-07-202024-12-31Cisco Technology, Inc.User lifecycle journey and asset data based bot skill selection
US12323290B2 (en)2023-03-162025-06-03Cisco Technology, Inc.Hierarchical auto summary generation with multi-task learning in networking recommendations
WO2025111947A1 (en)*2023-11-302025-06-05北京小米移动软件有限公司Life cycle management methods, indication sending method, terminals and network devices

Citations (32)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060031934A1 (en)*2004-08-042006-02-09Stonewater Control Systems, Inc.Monitoring system
US20100235738A1 (en)2009-03-162010-09-16Ibm CorporationProduct limitations advisory system
US20100257132A1 (en)*2009-04-032010-10-07Christopher CollardMethod And System For Self-Learning Issues Remediation
US20130006408A1 (en)2011-06-292013-01-03General Electric CompanyAutomated system for digitized product management
US20130066687A1 (en)*2011-09-142013-03-14Infosys LimitedSystem and method for measuring and managing innovation performance
US20140053146A1 (en)*2012-08-162014-02-20Avaya Inc.Network hardware and software upgrade recommender
US20150019700A1 (en)2013-07-092015-01-15Oracle International CorporationAdvanced customer support services - advanced support cloud portal
US20160189082A1 (en)2014-10-132016-06-30ServiceSource International, Inc.User interface and underlying data analytics for customer success management
US20160253046A1 (en)2015-02-272016-09-01Cisco Technology, Inc.Recording system state data and presenting a navigable graphical user interface
US20160254968A1 (en)2015-02-272016-09-01Cisco Technology, Inc.Dynamic troubleshooting workspaces for cloud and network management systems
US20160253078A1 (en)2015-02-272016-09-01Cisco Technology, Inc.Enhanced user interface systems including dynamic context selection for cloud-based networks
US20160283947A1 (en)*2015-03-262016-09-29Salesforce.Com, Inc.Sharing knowledge article content via a designated communication channel in an enterprise social networking and customer relationship management (crm) environment
US20160307219A1 (en)2015-04-192016-10-20Sugarcrm Inc.Customer lifecycle visualization tool
US20170364561A1 (en)2016-06-202017-12-21Microsoft Technology Licensing, LlcTelemetry data contextualized across datasets
US20190147412A1 (en)2017-11-102019-05-16General Electric CompanySystems and Methods to Generate an Asset Workscope
US20190188737A1 (en)2013-05-092019-06-20Rockwell Automation Technologies, Inc.Industrial data analytics in a cloud platform
US20190212901A1 (en)2018-01-082019-07-11Cisco Technology, Inc.Manipulation of content on display surfaces via augmented reality
US20190265971A1 (en)2015-01-232019-08-29C3 Iot, Inc.Systems and Methods for IoT Data Processing and Enterprise Applications
US20190294477A1 (en)2018-03-222019-09-26Amazon Technologies, Inc.Adoption of existing virtual computing resources into logical containers for management operations
US20190361720A1 (en)2018-05-242019-11-28Microsoft Technology Licensing, LlcContextual insight generation and surfacing on behalf of a user
US20200193311A1 (en)2018-12-182020-06-18Sri InternationalAutonomous system action explanation
US20200322181A1 (en)*2019-04-022020-10-08Fortinet, Inc.Scalable cloud switch for integration of on premises networking infrastructure with networking services in the cloud
US20210019133A1 (en)2019-07-152021-01-21Vmware, Inc.Deploying device campaign updates to iot devices
US20210035186A1 (en)*2019-08-022021-02-04Dell Products L.P.Data Representations for Collection of Complex Asset System Data
US20210081189A1 (en)2019-09-162021-03-18Cisco Technology, Inc.Determining Customized Software Recommendations for Network Devices
US20210089987A1 (en)2019-09-252021-03-25Rockwell Automation Technologies, Inc.Presentation of an overview of product lifecycles for components in an industrial environment
US20210120023A1 (en)2019-10-222021-04-22Honeywell International Inc.Apparatuses, methods, and computer program products for automatic improved network architecture generation
US20210224124A1 (en)2020-01-202021-07-22Oracle International CorporationTechniques for detecting drift in a deployment orchestrator
US20210295346A1 (en)2020-03-172021-09-23Cisco Technology, Inc.Analyzing telemetry data to track progress through an experience lifecycle and provide intelligent lifecycle-based information for computing solutions
US20210312351A1 (en)*2020-04-062021-10-07Johnson Controls Technology CompanyBuilding risk analysis system with geographic risk scoring
US20210406729A1 (en)2020-06-302021-12-30Dell Products L.P.Refining Mapped Human Experiences Insights within a Human Experience Flow
US20220148021A1 (en)2019-05-212022-05-12Craig P. WilsonData analytic method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11777799B2 (en)*2020-12-212023-10-03Cisco Technology, Inc.Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Patent Citations (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060031934A1 (en)*2004-08-042006-02-09Stonewater Control Systems, Inc.Monitoring system
US20100235738A1 (en)2009-03-162010-09-16Ibm CorporationProduct limitations advisory system
US20100257132A1 (en)*2009-04-032010-10-07Christopher CollardMethod And System For Self-Learning Issues Remediation
US20130006408A1 (en)2011-06-292013-01-03General Electric CompanyAutomated system for digitized product management
US20130066687A1 (en)*2011-09-142013-03-14Infosys LimitedSystem and method for measuring and managing innovation performance
US20140053146A1 (en)*2012-08-162014-02-20Avaya Inc.Network hardware and software upgrade recommender
US20190188737A1 (en)2013-05-092019-06-20Rockwell Automation Technologies, Inc.Industrial data analytics in a cloud platform
US20150019700A1 (en)2013-07-092015-01-15Oracle International CorporationAdvanced customer support services - advanced support cloud portal
US20160189082A1 (en)2014-10-132016-06-30ServiceSource International, Inc.User interface and underlying data analytics for customer success management
US20190265971A1 (en)2015-01-232019-08-29C3 Iot, Inc.Systems and Methods for IoT Data Processing and Enterprise Applications
US20160253046A1 (en)2015-02-272016-09-01Cisco Technology, Inc.Recording system state data and presenting a navigable graphical user interface
US20160253078A1 (en)2015-02-272016-09-01Cisco Technology, Inc.Enhanced user interface systems including dynamic context selection for cloud-based networks
US20160254968A1 (en)2015-02-272016-09-01Cisco Technology, Inc.Dynamic troubleshooting workspaces for cloud and network management systems
US20190266762A1 (en)2015-02-272019-08-29Cisco Technology, Inc.Enhanced user interface systems including dynamic context selection for cloud-based networks
US20160283947A1 (en)*2015-03-262016-09-29Salesforce.Com, Inc.Sharing knowledge article content via a designated communication channel in an enterprise social networking and customer relationship management (crm) environment
US20160307219A1 (en)2015-04-192016-10-20Sugarcrm Inc.Customer lifecycle visualization tool
US20170364561A1 (en)2016-06-202017-12-21Microsoft Technology Licensing, LlcTelemetry data contextualized across datasets
US20190147412A1 (en)2017-11-102019-05-16General Electric CompanySystems and Methods to Generate an Asset Workscope
US20190212901A1 (en)2018-01-082019-07-11Cisco Technology, Inc.Manipulation of content on display surfaces via augmented reality
US20190294477A1 (en)2018-03-222019-09-26Amazon Technologies, Inc.Adoption of existing virtual computing resources into logical containers for management operations
US20190361720A1 (en)2018-05-242019-11-28Microsoft Technology Licensing, LlcContextual insight generation and surfacing on behalf of a user
US20200193311A1 (en)2018-12-182020-06-18Sri InternationalAutonomous system action explanation
US20200322181A1 (en)*2019-04-022020-10-08Fortinet, Inc.Scalable cloud switch for integration of on premises networking infrastructure with networking services in the cloud
US20220148021A1 (en)2019-05-212022-05-12Craig P. WilsonData analytic method and system
US20210019133A1 (en)2019-07-152021-01-21Vmware, Inc.Deploying device campaign updates to iot devices
US20210035186A1 (en)*2019-08-022021-02-04Dell Products L.P.Data Representations for Collection of Complex Asset System Data
US20210081189A1 (en)2019-09-162021-03-18Cisco Technology, Inc.Determining Customized Software Recommendations for Network Devices
US20210089987A1 (en)2019-09-252021-03-25Rockwell Automation Technologies, Inc.Presentation of an overview of product lifecycles for components in an industrial environment
US20210120023A1 (en)2019-10-222021-04-22Honeywell International Inc.Apparatuses, methods, and computer program products for automatic improved network architecture generation
US20210224124A1 (en)2020-01-202021-07-22Oracle International CorporationTechniques for detecting drift in a deployment orchestrator
US20210295346A1 (en)2020-03-172021-09-23Cisco Technology, Inc.Analyzing telemetry data to track progress through an experience lifecycle and provide intelligent lifecycle-based information for computing solutions
US20210312351A1 (en)*2020-04-062021-10-07Johnson Controls Technology CompanyBuilding risk analysis system with geographic risk scoring
US20210406729A1 (en)2020-06-302021-12-30Dell Products L.P.Refining Mapped Human Experiences Insights within a Human Experience Flow

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
Capterra, Inc. "Customer Experience Software", https://www.capterra.com/sem-compare/customer-experience-software/, downloaded from Internet Jun. 24, 2021, 3 pages.
G2, "Oracle Customer Experience (CX) Cloud Site", Sales Platforms, downloaded from Internet Jun. 24, 2021, 22 pages.
Gainsight, "Customer Lifecycle Management", https://www.gainsight.com/your-success/customer-lifecycle-management/, downloaded Aug. 5, 2021, 2 pages.
McKinset & Company, "Customer Lifecycle Management", How we Help Clients, https://www.mckinsey.com/business-functions/marketing-and-sales/how-we-help-clients/customer-lifecycle-management#, downloaded Aug. 5, 2021, 8 pages.
Salesforce, "From Lead to Loyal: Creating Engagement through Effective Customer Lifecycle Management", https://www.salesforce.com/products/marketing-cloud/best-practices/customer-lifecycle-management/, downloaded Aug. 5, 2021, 6 pages.

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230362054A1 (en)*2020-12-212023-11-09Cisco Technology, Inc.Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)
US12301416B2 (en)*2020-12-212025-05-13Cisco Technology, Inc.Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)

Also Published As

Publication numberPublication date
US12301416B2 (en)2025-05-13
US20220200928A1 (en)2022-06-23
US20220200855A1 (en)2022-06-23
US20230362054A1 (en)2023-11-09
US11677623B2 (en)2023-06-13

Similar Documents

PublicationPublication DateTitle
US12301416B2 (en)Cloud portal system for managing networking and computing equipment by generating contextual guides specific to affected resource(s)
US11876824B2 (en)Extracting process aware analytical attack graphs through logical network analysis
US9306806B1 (en)Intelligent resource repository based on network ontology and virtualization
Hadar et al.Big data analytics on cyber attack graphs for prioritizing agile security requirements
US20150213267A1 (en)Remote enterprise security compliance reporting tool
US12149410B2 (en)Automated generation of standard network device configurations
AU2019213410B2 (en)Improved machine learning classification with model quality prediction
US11438226B2 (en)Identification of network device configuration changes
US11533241B2 (en)Peer risk benchmarking using generative adversarial networks
US20240386066A1 (en)Generative knowledge search engine for multi-query enabled network knowledge completion
US12231300B2 (en)Heterogeneous graph learning-based unified network representation
US20250190861A1 (en)Artificial intelligence assistant for network services and management
US20230099153A1 (en)Risk-based aggregate device remediation recommendations based on digitized knowledge
US20250037056A1 (en)Hierarchical partner risk evaluation using fuzzy logic
US20240232747A9 (en)Personas detection and task recommendation system in network
US20250077859A1 (en)Video retrieval based contextualized learning
Evancich et al.Network-wide awareness
US11917025B2 (en)System for lifecycle progression leveraging adoption journey of networking and computing equipment
US12307302B2 (en)Case deflection using visibility into multi-product clouds
US12323290B2 (en)Hierarchical auto summary generation with multi-task learning in networking recommendations
US20250150345A1 (en)Intelligent auto-prompt engine for network management
US20240179218A1 (en)Determining network-specific user behavior and intent using self-supervised learning
US12341650B2 (en)Persona-based multi-scale network related digest generation
US12184516B2 (en)User lifecycle journey and asset data based bot skill selection
JahanWIRELESS NETWORK MANAGEMENT AND AUTOMATION TOOLS A Comparison study between Cisco Prime and DNAc

Legal Events

DateCodeTitleDescription
FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ASAssignment

Owner name:CISCO TECHNOLOGY, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GARRISON, DANIEL ROBERT;SARBIN, BRIAN;EBTEKAR, ALI;REEL/FRAME:057100/0167

Effective date:20210804

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE

CCCertificate of correction

[8]ページ先頭

©2009-2025 Movatter.jp